{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:06:15Z","timestamp":1742987175753,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811337017"},{"type":"electronic","value":"9789811337024"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-3702-4_2","type":"book-chapter","created":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T10:50:43Z","timestamp":1547635843000},"page":"17-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Byte Label Malware Classification Using Image Entropy"],"prefix":"10.1007","author":[{"given":"Ayan","family":"Dey","sequence":"first","affiliation":[]},{"given":"Sukriti","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Nataraj, L.,\u00a0Karthikeyan, S., Jacob, G.,\u00a0Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, p.\u00a04. ACM (2011)","DOI":"10.1145\/2016904.2016908"},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/52.877857","volume":"17","author":"G McGraw","year":"2000","unstructured":"McGraw, G., Gregory Morrisett, J.: Attacking malicious code: a report to the infosec research council. IEEE Softw. 17(5), 33\u201341 (2000)","journal-title":"IEEE Softw."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8\u201311 May 2005, Oakland, CA, USA, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"2_CR4","unstructured":"Vasudevan, A., Yerraballi, R.: Spike: engineering malware analysis tools using unobtrusive binary-instrumentation. In: Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Computer Science 2006, Hobart, Tasmania, Australia, 16\u201319 Jan 2006, pp. 311\u2013320 (2006)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(Parts I and II), 379\u2013423\u00a0623\u2013656 (1948)","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"2_CR6","unstructured":"Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 113\u2013120. IEEE (2010)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Santos, I., Brezo, F., Nieves, J., Penya, Y.K., Sanz, B., Laorden, C., Bringas, P.G.: Idea: Opcode-sequence-based malware detection. In: International Symposium on Engineering Secure Software and Systems, pp. 35\u201343. Springer (2010)","DOI":"10.1007\/978-3-642-11747-3_3"},{"key":"2_CR8","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004, vol.\u00a02, pp. 41\u201342. IEEE (2004)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Tabish, S.M.,\u00a0Shafiq, M.Z., Farooq, M.: Malware detection using statistical analysis of byte-level file content. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, 28 June 2009, pp. 23\u201331 (2009)","DOI":"10.1145\/1599272.1599278"},{"key":"2_CR10","unstructured":"Bergeron, J.,\u00a0Debbabi, M.,\u00a0Desharnais, J.,\u00a0Ktari, B.,\u00a0Salois, M.,\u00a0Tawbi, N.: Detection of malicious code in cots software: a short survey. In: 1st International Software Assurance Certification Conference (ISACC99) (1999)"},{"key":"2_CR11","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Symantec. Press (2005)"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/A:1011139631724","volume":"42","author":"A Oliva","year":"2001","unstructured":"Oliva, A., Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vis. 42(3), 145\u2013175 (2001)","journal-title":"Int. J. Comput. Vis."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Torralba, A., Murphy, K.P., Freeman, W.T., Rubin, M.A., et\u00a0al.: Context-based vision system for place and object recognition. In: ICCV, vol.\u00a03, pp. 273\u2013280 (2003)","DOI":"10.1109\/ICCV.2003.1238354"},{"key":"2_CR14","unstructured":"Chowdhury, G.: Introduction to Modern Information Retrieval. Facet Publishing (2010)"},{"key":"2_CR15","unstructured":"Han, K.S., Kim, S.-R., Im, E.G.: Instruction frequency-based malware classification method1. Int. Inf. Inst. (Tokyo) Inf. 15(7), 2973 (2012)"},{"key":"2_CR16","unstructured":"Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automaton-based method for detecting anomalous program behaviors. In: 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings, pp. 144\u2013155. IEEE (2001)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1043\u20131047. ACM (2007)","DOI":"10.1145\/1281192.1281308"},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"SA Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6(3), 151\u2013180 (1998)","journal-title":"J. Comput. Secur."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 225\u2013238. ACM (2008)","DOI":"10.1145\/1378600.1378626"},{"issue":"4","key":"2_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G Wagener","year":"2008","unstructured":"Wagener, G., Dulaunoy, A., et al.: Malware behaviour analysis. J. Comput. Virol. 4(4), 279\u2013287 (2008)","journal-title":"J. Comput. Virol."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Morley Mao, Z., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: International Workshop on Recent Advances in Intrusion Detection, pp. 178\u2013197. Springer (2007)","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Kephart, J.O.: A biologically inspired immune system for computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pp. 130\u2013139. MIT Press (1994)","DOI":"10.7551\/mitpress\/1428.003.0017"},{"key":"2_CR23","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA, 14\u201316 May 2001, pp. 38\u201349 (2001)"},{"key":"2_CR24","first-page":"2721","volume":"6","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 6, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"2_CR25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R Lyda","year":"2007","unstructured":"Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 5(2), 40\u201345 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR26","unstructured":"Li, W.-J.,\u00a0Wang, K., Santos, I.,\u00a0Herzog, B.: Fileprints: identifying filetypes by n-gram analysis. In: Information Assurance Workshop, USA, pp. 67\u201371. IEEE Press (2005)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J.,\u00a0Wang, K., Li, W.-J.: Towards stealthy malware detection. In: Malware Detection, pp. 231\u2013249 (2007)","DOI":"10.1007\/978-0-387-44599-1_11"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/978-3-642-13022-9_51","volume-title":"Trends in Applied Intelligent Systems","author":"Thomas Stibor","year":"2010","unstructured":"Stibor, T.: A study of detecting computer viruses in real-infected files in the n-gram representation with machine learning methods. In: Trends in Applied Intelligent Systems\u201423rd International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA\/AIE 2010, Cordoba, Spain, 1\u20134 June 2010, Proceedings, Part I, pp. 509\u2013519 (2010)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Santos, I., Nieves, J., Bringas, P.G.: Semi-supervised learning for unknown malware detection. In: International Symposium on Distributed Computing and Artificial Intelligence, pp. 415\u2013422. Springer (2011)","DOI":"10.1007\/978-3-642-19934-9_53"},{"issue":"1","key":"2_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-014-0242-0","volume":"14","author":"KS Han","year":"2015","unstructured":"Han, K.S., Lim, J.H., Kang, B., Im, E.G.: Malware analysis using visualized images and entropy graphs. Int. J. Inf. Secur. 14(1), 1\u201314 (2015)","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"2_CR31","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0734-189X(85)90125-2","volume":"29","author":"JN Kapur","year":"1985","unstructured":"Kapur, J.N., Sahoo, P.K., Wong, A.K.C.: A new method for gray-level picture thresholding using the entropy of the histogram. Comput. Vis. Graph. Image Process. 29(3), 273\u2013285 (1985)","journal-title":"Comput. Vis. Graph. Image Process."},{"issue":"3","key":"2_CR32","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1113\/jphysiol.1968.sp008574","volume":"197","author":"FW Campbell","year":"1968","unstructured":"Campbell, F.W., Robson, J.G.: Application of Fourier analysis to the visibility of gratings. J. Physiol. 197(3), 551 (1968)","journal-title":"J. Physiol."},{"issue":"02","key":"2_CR33","first-page":"56","volume":"5","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5(02), 56 (2014)","journal-title":"J. Inf. Secur."},{"key":"2_CR34","unstructured":"Microsoft Malware Classification Challenge (big 2015) (2015)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3702-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T04:02:04Z","timestamp":1720929724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3702-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811337017","9789811337024"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3702-4_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}